vergriffen

Readings & Cases in Information Security - Law & Ethics

Englisch · Taschenbuch

Beschreibung

Mehr lesen

READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Inhaltsverzeichnis

Part I: PREFACE & INTRODUCTION.Part II: RUNNING CASE: INTRODUCTION AND BACKGROUND.Part III: PERSONNEL & PRIVACY.Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case.Part IV: RISK MANAGEMENT.Reading: CYBER Insurance and Residual Information Risk ManagementTridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case.Part V: MANAGEMENT OF SECURITY TECHNOLOGY.Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case.Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT.Case: Legal and Ethical Issues in Information Security MetricsJennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State UniversityWendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case.Part VII: REGULATORY COMPLIANCE MANAGEMENT.Reading: Security Compliance Auditing: Review and Research DirectionsGuillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State UniversityAndrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study.Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute & State University, Jeffrey P. Landry, University of South Alabama. Running Case.

Produktdetails

Autoren Herbert Mattord, Michael Whitman
Verlag Cengage Learning EMEA
 
Sprache Englisch
Produktform Taschenbuch
Erschienen 01.01.2010
 
EAN 9781435441576
ISBN 978-1-4354-4157-6
Seiten 352

Kundenrezensionen

Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.

Schreibe eine Rezension

Top oder Flop? Schreibe deine eigene Rezension.

Für Mitteilungen an CeDe.ch kannst du das Kontaktformular benutzen.

Die mit * markierten Eingabefelder müssen zwingend ausgefüllt werden.

Mit dem Absenden dieses Formulars erklärst du dich mit unseren Datenschutzbestimmungen einverstanden.